{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T21:12:35Z","timestamp":1654117955288},"reference-count":63,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4,1]]},"abstract":"<p>Information Technology (IT) is a new tool in education that continually changes and offers new opportunities for teaching and learning. In general, the effects of IT are complex and depend upon people\u2019s decisions about development and use. This study investigates the ethical issues in education in terms of Information Systems students\u2019 attitudes at Saudi universities towards digital piracy. The differences in the ethical decision-making process, ethical awareness, and intention to perform questionable acts is examined. The authors tested for differences in attitudes toward eighteen different questionable actions by using three different factors (gender, age, and university level). The measures of awareness capture the extent to which respondents felt that a particular action was unethical according to each of several ethical criteria. This work explored information technology ethics in several ways. The work analyzed whether information technology use is viewed by individuals as an ethical topic and demographic differences were explored. Significant differences were found in many cases between demographic groups based on ethical issues. These findings can be used to target and address ethical issues and enforcement in information systems curriculum.<\/p>","DOI":"10.4018\/ijcee.2011040104","type":"journal-article","created":{"date-parts":[[2011,10,20]],"date-time":"2011-10-20T14:38:10Z","timestamp":1319121490000},"page":"41-53","source":"Crossref","is-referenced-by-count":0,"title":["Ethical Decision Making with Information Systems Students"],"prefix":"10.4018","volume":"1","author":[{"given":"Samer","family":"Alhawari","sequence":"first","affiliation":[{"name":"Applied Science Private University, Jordan"}]},{"given":"Amine Nehari","family":"Talet","sequence":"additional","affiliation":[{"name":"King Fahd University of Petroleum & Minerals, Saudi Arabia"}]}],"member":"2432","reference":[{"key":"ijcee.2011040104-0","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-005-1902-9"},{"key":"ijcee.2011040104-1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00882026"},{"key":"ijcee.2011040104-2","doi-asserted-by":"publisher","DOI":"10.2307\/249677"},{"key":"ijcee.2011040104-3","first-page":"6","article-title":"A behavioral model of ethical decision making","author":"M.Bommer","year":"1991","journal-title":"Ethical issues in information systems"},{"key":"ijcee.2011040104-4","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005748725174"},{"key":"ijcee.2011040104-5","unstructured":"BSA\/SPA. (2008). Study report on global software piracy. Retrieved from http:\/\/global.bsa.org\/globalpiracy2008\/studies\/studybrief.pdf"},{"key":"ijcee.2011040104-6","unstructured":"Business Software Alliance. (2009). The economic benefits of reducing software piracy. Retrieved from http:\/\/portal.bsa.org\/piracyimpact2010\/index.html"},{"key":"ijcee.2011040104-7","doi-asserted-by":"publisher","DOI":"10.1023\/B:BUSI.0000032658.12032.4e"},{"key":"ijcee.2011040104-8","doi-asserted-by":"publisher","DOI":"10.1145\/298752.298756"},{"key":"ijcee.2011040104-9","first-page":"210","article-title":"Preparing IS students to deal with ethical issues.","author":"D. J.Couger","year":"1989","journal-title":"Management Information Systems Quarterly"},{"key":"ijcee.2011040104-10","doi-asserted-by":"publisher","DOI":"10.1007\/BF02310555"},{"issue":"4","key":"ijcee.2011040104-11","first-page":"26","article-title":"Perspectives on business ethics management education.","volume":"55","author":"E. R.David","year":"1990","journal-title":"SAM Advanced Management Journal"},{"key":"ijcee.2011040104-12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005721916646"},{"key":"ijcee.2011040104-13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1017917420433"},{"key":"ijcee.2011040104-14","doi-asserted-by":"publisher","DOI":"10.1145\/506740.506750"},{"key":"ijcee.2011040104-15","author":"G. W.England","year":"1975","journal-title":"The manager and his values"},{"key":"ijcee.2011040104-16","doi-asserted-by":"publisher","DOI":"10.1007\/BF02074820"},{"key":"ijcee.2011040104-17","doi-asserted-by":"publisher","DOI":"10.1177\/0013164491512011"},{"key":"ijcee.2011040104-18","doi-asserted-by":"publisher","DOI":"10.1108\/00251740410565172"},{"key":"ijcee.2011040104-19","author":"A.Gewirth","year":"1978","journal-title":"Reason and morality"},{"key":"ijcee.2011040104-20","doi-asserted-by":"publisher","DOI":"10.1108\/07378830710735858"},{"key":"ijcee.2011040104-21","unstructured":"Granger, M. J., & Schroeder, D. L. (1994, May 21-25). More than just email: The Internet for information systems education. In Proceedings of IRMA, San Antonio, TX (pp. 376-380)."},{"key":"ijcee.2011040104-22","doi-asserted-by":"publisher","DOI":"10.1080\/10580539708907072"},{"key":"ijcee.2011040104-23","doi-asserted-by":"publisher","DOI":"10.1108\/02635570710719025"},{"key":"ijcee.2011040104-24","doi-asserted-by":"publisher","DOI":"10.1108\/00242539810369954"},{"issue":"2","key":"ijcee.2011040104-25","first-page":"60","article-title":"A comparison of IS ethics attitudes among college students.","volume":"35","author":"A.Harris","year":"1994","journal-title":"Journal of Computer Information Systems"},{"key":"ijcee.2011040104-26","doi-asserted-by":"publisher","DOI":"10.1108\/07378830710735876"},{"key":"ijcee.2011040104-27","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-007-9140-8"},{"key":"ijcee.2011040104-28","first-page":"60","article-title":"Are women really more ethical than men? Maybe it depends on the situation.","volume":"10","author":"J. J.Hoffman","year":"1998","journal-title":"Journal of Managerial Issues"},{"key":"ijcee.2011040104-29","doi-asserted-by":"publisher","DOI":"10.1108\/00251740210441422"},{"key":"ijcee.2011040104-30","doi-asserted-by":"publisher","DOI":"10.1108\/13522750610689113"},{"key":"ijcee.2011040104-31","doi-asserted-by":"publisher","DOI":"10.1023\/B:BUSI.0000013863.82522.98"},{"key":"ijcee.2011040104-32","doi-asserted-by":"publisher","DOI":"10.1145\/285070.285084"},{"key":"ijcee.2011040104-33","doi-asserted-by":"publisher","DOI":"10.1108\/02635570510633239"},{"key":"ijcee.2011040104-34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17705\/1jais.00012","article-title":"Illegal, inappropriate and unethical behavior in an information technology context: A study to explain influences.","volume":"1","author":"L. N. K.Leonard","year":"2001","journal-title":"Journal of the Association for Information Systems"},{"key":"ijcee.2011040104-35","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.im.2003.12.008","article-title":"What influences IT ethical behavior intentions \u2013 planned behavior, reasoned action, perceived importance, or individual characteristics?","volume":"42","author":"L. N. K.Leonard","year":"2004","journal-title":"Information & Management"},{"key":"ijcee.2011040104-36","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2004.835087"},{"key":"ijcee.2011040104-37","doi-asserted-by":"publisher","DOI":"10.1023\/B:BUSI.0000005745.63324.79"},{"key":"ijcee.2011040104-38","article-title":"The meaning and measurement of moral judgment competence revisited - a dual-aspect model","author":"G.Lind","year":"2002","journal-title":"Contemporary philosophical and psychological perspectives on moral development and education"},{"key":"ijcee.2011040104-39","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006154023743"},{"key":"ijcee.2011040104-40","doi-asserted-by":"publisher","DOI":"10.1007\/BF00382952"},{"key":"ijcee.2011040104-41","doi-asserted-by":"publisher","DOI":"10.1080\/0899340880010104"},{"key":"ijcee.2011040104-42","author":"J.Nunnaly","year":"1978","journal-title":"Psychometric theory"},{"key":"ijcee.2011040104-43","doi-asserted-by":"publisher","DOI":"10.1007\/BF00383688"},{"key":"ijcee.2011040104-44","author":"D. B.Parker","year":"1990","journal-title":"Ethical conflicts in information and computer science, technology and business"},{"key":"ijcee.2011040104-45","doi-asserted-by":"publisher","DOI":"10.1111\/0045-3609.00126"},{"key":"ijcee.2011040104-46","doi-asserted-by":"publisher","DOI":"10.1108\/13527600210797488"},{"key":"ijcee.2011040104-47","doi-asserted-by":"publisher","DOI":"10.1108\/00251740010373070"},{"key":"ijcee.2011040104-48","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005742408725"},{"key":"ijcee.2011040104-49","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.89.1.5"},{"key":"ijcee.2011040104-50","doi-asserted-by":"publisher","DOI":"10.1108\/09593840010339853"},{"key":"ijcee.2011040104-51","author":"M.Saunders","year":"2007","journal-title":"Research methods for business students"},{"key":"ijcee.2011040104-52","doi-asserted-by":"publisher","DOI":"10.1007\/BF00871970"},{"key":"ijcee.2011040104-53","doi-asserted-by":"publisher","DOI":"10.1007\/BF00383161"},{"key":"ijcee.2011040104-54","doi-asserted-by":"publisher","DOI":"10.1023\/A:1017922005651"},{"key":"ijcee.2011040104-55","doi-asserted-by":"publisher","DOI":"10.1007\/BF00881451"},{"key":"ijcee.2011040104-56","doi-asserted-by":"publisher","DOI":"10.1007\/BF00381852"},{"issue":"3","key":"ijcee.2011040104-57","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/569905.569908","article-title":"Ethics and information systems: Resolving the quandaries.","volume":"33","author":"H.Smith","year":"2002","journal-title":"The Data Base for Advances in Information Systems"},{"key":"ijcee.2011040104-58","author":"R.Solomon","year":"1993","journal-title":"Ethics and excellence"},{"key":"ijcee.2011040104-59","author":"M.Timmons","year":"2002","journal-title":"Moral theory: An introduction"},{"issue":"1","key":"ijcee.2011040104-60","article-title":"What is ethics?","volume":"1","author":"M.Velasquez","year":"1987","journal-title":"Issues in Ethics"},{"key":"ijcee.2011040104-61","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-004-1772-6"},{"issue":"2","key":"ijcee.2011040104-62","article-title":"The relationship between ethical decision making and ethical reasoning in information technology students.","volume":"18","author":"B.Woodward","year":"2007","journal-title":"Journal of Information Systems Education"}],"container-title":["International Journal of Cyber Ethics in Education"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=54452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:39:16Z","timestamp":1654115956000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcee.2011040104"}},"subtitle":["An Exploratory Study"],"short-title":[],"issued":{"date-parts":[[2011,4,1]]},"references-count":63,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcee.2011040104","relation":{},"ISSN":["2155-6903","2155-6911"],"issn-type":[{"value":"2155-6903","type":"print"},{"value":"2155-6911","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,1]]}}}